upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
(1) In XRF (CICS Transaction Server only), a terminal belonging to a class mainly comprised of TCAM(DCB) terminals. These terminals lose their sessions at takeover. The CICS/VSE equivalent of this is untracked terminal.<br />(2) A terminal that communicate with XRF IMS but whose sessions are not automatically reestablished at takeover.
Industry:Software
(1) An application written with the Content Manager APIs to customize a user interface.<br />(2) An application written with object-oriented or Internet APIs to access content servers from Information Integrator for Content.<br />(3) An application, running on a workstation and linked to a client, that gives the application access to queuing services on a server.<br />(4) A user application, written in a supported programming language other than Java, that communicates directly with the Client daemon.<br />(5) A storage management program that initiates Common Information Model (CIM) requests to the CIM agent for the device.
Industry:Software
(1) In computer security, assurance that the information that arrives at a destination is the same as the information that was sent.<br />(2) The quality of data that exists as long as destruction, alteration, loss of consistency, or loss of data are prevented.
Industry:Software
(1) In XRF (CICS Transaction Server only), a terminal belonging to a class mainly comprised of VTAM terminals that are not eligible for class 1. For these terminals, the alternate system tracks the session, and attempts reestablishment after takeover. The CICS/VSE equivalent of this is tracked terminal .<br />(2) A terminal for which IMS in the alternate reestablishes service at takeover.
Industry:Software
(1) An application-defined identifier assigned to distributions for the user's information.<br />(2) A field in a message that provides a means of identifying related messages. Correlation identifiers are used, for example, to match request messages with their corresponding reply message.<br />(3) In DB2 for z/OS, an identifier that is associated with a specific thread. In TSO, the correlation ID is either an authorization identifier or the job name.
Industry:Software
(1) In computer security, the process of transforming encoded text or ciphertext into plaintext.<br />(2) The process of decoding data that has been encrypted into a secret format. Decryption requires a secret key or password.
Industry:Software
(1) In XRF, a data set that ensures XRF system integrity by allowing only one active CICS system to access a particular set of resources. It is used by the active and alternate CICS systems to monitor each other's status.<br />(2) A data set containing configurational, operational, and communication information. The z/OS storage management subsystem (SMS), DFSMSrmm, and DFSMShsm use control data sets. See also active control data set, backup control data set, communications data set, source control data set, migration control data set, offline control data set.
Industry:Software
(1) An archive file on a target server that represents a sequential media volume on a source server.<br />(2) A tape volume that resides in a tape volume cache of a virtual tape server (VTS). Whether the volume resides in the tape volume cache as a virtual volume or on a stacked volume as a logical volume (LVOL) is transparent to the host.
Industry:Software
(1) In computer security, the right granted to a user to communicate with or make use of a computer system.<br />(2) The process of granting a user, system, or process either complete or restricted access to an object, resource, or function.<br />(3) The process by which data in the database catalog is used to obtain information about an authenticated user, such as which database operations the user can perform and which data objects the user can access. See also privilege, authority level, database authority.<br />(4) The process of granting or denying access to a network resource. Security systems use a two-step process: after authentication has verified that a user is who she says she is, authorization allows the user access to various resources based on the user's identity.<br />(5) The method that determines which portlets a user or a user group can access.<br />(6) The process of obtaining permission to perform specific actions.
Industry:Software
(1) In XRF, the process by which the alternate CICS system mirrors the starting and stopping of terminal sessions in the active CICS system so that it is prepared to take over the active system should the need arise.<br />(2) The capability that a learning management system provides to capture student progress and interaction data produced by content for storage in, and subsequent retrieval from, a data store.
Industry:Software
© 2024 CSOFT International, Ltd.